Skip to main content

Abstract

This chapter presents specific amendments to the IEEE 802.15.4, so that some of the open issues that have been previously identified. In particular, a new implicit GTS allocation mechanism (i-GAME) is proposed that over performs the default one. Then, a node grouping mechanism (H-NAMe) is proposed so that the hidden nodes problem is mitigated and consequently energy-efficiency, throughput and latency are improved. Also, we present a very simple mechanism to exploit differentiate the traffic based on multiple priority. Finally, an overview of several improvements affecting the security and privacy of the messages against external attacks and spoofing is presented. Importantly, all these mechanisms have been implemented and integrated in the 15.4 protocol stack and experimentally validated.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Here the focus is on the implementation of the mechanism, while the theory behind it, which is based on the Network Calculus analysis, is not reported. Interested reader can refer to [2].

  2. 2.

    \(b\) is the burst size, \(r\) is the arrival rate and \(D\) the maximum delay requirement.

References

  1. Institute of Electrical and Electronics Engineers, Inc., New York. IEEE Std. 802.15.4-2006, IEEE Standard for Information Technology—Telecommunications and Information Exchange Between Systems— Local and Metropolitan Area Networks—Specific Requirements Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (WPANs), September 2006

    Google Scholar 

  2. A. Koubâa, M. Alves, E. Tovar, A. Cunha, An implicit gts allocation mechanism in IEEE 802.15.4 for time-sensitive wireless sensor networks: theory and practice. Real-Time Syst. J. 39(1–3), 169–204 (2008)

    Google Scholar 

  3. A. Cunha, A. Koubâa, R. Severino, M. Alves, Open-zb: an open source implementation of the IEEE 802.15.4/zigbee protocol stack on tinyos. In Proceedings of the 4th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS), Oct 2007

    Google Scholar 

  4. MEMSIC MPR2400CB, 2.4GHz MICAz Processor Board, datasheet (2013), http://www.memsic.com/wireless-sensor-networks

  5. A. Koubâa, Y.-Q. Song, Evaluation and improvement of response time bounds for real-time applications under non-pre-emptive fixed priority scheduling. Int. J. Prod. Res. 42(14), 2899–2913 (2004)

    Article  MATH  Google Scholar 

  6. L.-J. Hwang, S.-T. Sheu, Y.-Y. Shih, Y.-C. Cheng, Grouping strategy for solving hidden node problem in IEEE 802.15.4 lr-wpan. In Wireless Internet, 2005. Proceedings. First International Conference on, pp. 26–32, July 2005

    Google Scholar 

  7. A. Koubâa, R. Severino, M. Alves, E. Tovar, Improving Quality-of-Service in Wireless Sensor Networks by mitigating hidden-node collisions, IEEE. Trans. Ind. Info. 5(3), 299–313, August 2009

    Google Scholar 

  8. IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs). IEEE P802.15 Wireless Personal Area Networks—MAC and Security Baseline Proposal—Normative Text, March 2010. https://mentor.ieee.org/802.15/dcn/10/15-10-0196-02-0006-mac-and-security-b

  9. Tinyos working group, 2010. www.tinyos.net

  10. A. Koubâa, M. Alves, E.Tovar, A comprehensive simulation study of slotted csma/ca for IEEE 802.15.4 wireless sensor networks. In Proceedings of the 5th Workshop on Factory Communication Systems (WFCS), pp. 183–192, June 2006

    Google Scholar 

  11. Texas Instruments, SmartRF Protocol Packet Sniffer, http://www.ti.com/tool/packet-sniffer

  12. A. Koubâa, M. Alves, B. Nefzi, Y. Song, Improving the IEEE 802.15.4 slotted csma/ca mac for time-critical events in wireless sensor networks. In Proceedings of the 5th Workshop on Real Time Networks (RTN), July 2006

    Google Scholar 

  13. R. Severino, M. Batsa, M. Alves, A. Koubaa, A traffic differentiation add-on to the IEEE 802.15.4 protocol: Implementation and experimental validation over a real-time operating system. In Proceedings of the 2010 13th Euromicro Conference on Digital System Design: Architectures, Methods and Tools, DSD ’10, pp. 501–508, IEEE Computer Society, Washington, DC, USA, 2010

    Google Scholar 

  14. Erika enterprise and rt-druid, 2012. http://erika.tuxfamily.org

  15. A. Cunha, R. Severino, N. Pereira, A. Koubâa, M. Alves, Zigbee over tinyos: implementation and experimental challenges. In Proceedings of the 8th Portuguese Conference on Automatic Control (CONTROLO), pp. 911–916, July 2008

    Google Scholar 

  16. M. Batsa, Supporting different qos levels in multiple-cluster wireless sensor networks. Master’s thesis, Computer Science and Engineering, Department of Electronics and Computer Engineering, Indian Institute of Technology (IIT) Roorkee, September 2009. defended Jan 2010

    Google Scholar 

  17. Evidence Srl, Via Carducci 56, Ghezzano, 56010 S.Giuliano Terme, Pisa - Italy. FLEX - Modular soultion for embedded applications, September 2011. version: 1.0.2

    Google Scholar 

  18. National Institute of Standards and Technology. Federal Information Processing Standards Publication 197, Specification for the ADVANCED ENCRYPTION STANDARD (AES), November 2001

    Google Scholar 

  19. R. Daidone, G. Dini, M. Tiloca. On experimentally evaluating the impact of security on IEEE 802.15.4 networks. In International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS), pp. 1–6, June 2011

    Google Scholar 

  20. R. Daidone, Experimental evaluations of security impact on ieee 802.15.4 networks. In PhD Forum at IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2011), June 2011

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Stefano Tennina .

Rights and permissions

Reprints and permissions

Copyright information

© 2013 The Author(s)

About this chapter

Cite this chapter

Tennina, S. et al. (2013). Amendments to the IEEE 802.15.4 Protocol. In: IEEE 802.15.4 and ZigBee as Enabling Technologies for Low-Power Wireless Systems with Quality-of-Service Constraints. SpringerBriefs in Electrical and Computer Engineering(). Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37368-8_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-37368-8_5

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-37367-1

  • Online ISBN: 978-3-642-37368-8

  • eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)

Publish with us

Policies and ethics